Ditemukan 9639 dokumen yang sesuai dengan query
"This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches."
Berlin: Springer-Verlag, 2012
e20409040
eBooks Universitas Indonesia Library
Joy Ying Zhang, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile Computing, Applications, and Services (MobiCASE 2011) held in Los Angeles, CA, USA, during October 24-27, 2010. The 18 revised full papers presented together with 12 revised poster papers were carefully reviewed and selected from numerous submissions. The conference papers are organized in seven technical sessions, covering the topics of mobile pervasive applications, system issues, location-aware services, mobile phone based systems, mobile Web and services, tools for mobile environments, and mobile application development issues."
Heidelberg: [Springer, ], 2012
e20409557
eBooks Universitas Indonesia Library
"The volume contains 6 research papers, which have been carefully reviewed and selected from 12 submissions, plus the 3 keynotes presented at the workshop. The topics cover all stages of the business intelligence cycle, including capturing of real-time data, handling of temporal or uncertain data, performance issues, event management, and the optimization of complex ETL workflows.
"
Berlin: Springer-Verlag, 2012
e20409276
eBooks Universitas Indonesia Library
Orr Dunkelman, editor
"This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation."
Berlin: Springer-Verlag, 2012
e20408217
eBooks Universitas Indonesia Library
Aggelos Kiayias, editor
"The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences."
Berlin: [, Springer-Verlag], 2012
e20409479
eBooks Universitas Indonesia Library
"This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011. The 22 revised full papers presented were carefully selected from numerous submissions covering topics such as school choice, markets for housing, energy, and advertising, prediction markets, and the theory of market design."
Heidelberg: Springer, 2012
e20410490
eBooks Universitas Indonesia Library
"This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011. The 9 full papers included in the book are revised and significantly extended versions of papers submitted to the workshops. They cover a wide range of topics organized in three main themes, communities and networks in ubiquitous social media, mining approaches, and issues of user modeling, privacy and security."
Berlin: Springer-Verlag, 2012
e20408552
eBooks Universitas Indonesia Library
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in September 2011. The 30 revised full papers were carefully selected from numerous submissions and are organized thematically in 5 parts. These are mobile and wireless networks, self organized and mesh networks, new approaches for network visualization, network services, and security"
Heidelberg: Springer, 2012
e20409211
eBooks Universitas Indonesia Library
"This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection, anonymity and privacy, wireless security, system security, DNS and routing security, and key management."
Heidelberg: Springer, 2012
e20410251
eBooks Universitas Indonesia Library
"This two-volume-set (LNCS 7203 and 7204) constitutes the refereed proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics, PPAM 2011, held in Torun, Poland, in September 2011. The 130 revised full papers presented in both volumes were carefully reviewed and selected from numerous submissions. The papers address issues such as parallel/distributed architectures and mobile computing, numerical algorithms and parallel numerics, parallel non-numerical algorithms, tools and environments for parallel/distributed/grid computing, applications of parallel/distributed computing, applied mathematics, neural networks and evolutionary computing, history of computing."
Berlin : Springer-Verlag, 2012
e20410418
eBooks Universitas Indonesia Library